Varonis, a cybersecurity firm, has unearthed a new vulnerability in Microsoft products, alongside several attack methodologies that allow malefactors to acquire users’ password hashes. Identified as CVE-2023-35636, this critical vulnerability affects the shared calendar...
According to researchers from Jamf Threat Labs, pirated applications for the macOS operating system distributed on Chinese websites are embedded with malicious software that grants attackers remote access to infected computers. Among these applications...
The Cybersecurity and Infrastructure Security Agency (CISA) of the United States has urgently issued a directive, urging Federal Civilian Executive Branch (FCEB) agencies to mitigate the effects of two actively exploited zero-day vulnerabilities in...
GitHub, a platform for programmers, is a popular and favorite tool for hackers, used to store and distribute malware. According to a recent report by Recorded Future, a cybersecurity company based in the United...
Trustwave has issued a warning regarding the notable surge in the exploitation of a patched vulnerability within Apache ActiveMQ, aimed at deploying the Godzilla web shell onto compromised hosts. The web shells, concealed in...
The cybercriminal group TA866, renowned for its phishing endeavors, has resumed its malevolent operations after a nine-month hiatus, according to cybersecurity firm Proofpoint. Recently, the hackers have launched a widespread campaign targeting users in...
A cybercriminal group linked to China, known as UNC3886, has clandestinely exploited a critical zero-day vulnerability in the VMware vCenter Server management system since late 2021. This revelation was disclosed in a recent report...
Following the official release of Linux Kernel 6.7, the testing phase for version 6.8 has commenced. Recently, Linus Torvalds introduced the Linux Kernel 6.8 RC1. Should there be seven candidates in total, the official...
In mid-January, Microsoft released the latest cumulative updates for supported versions of Windows, aimed at rectifying known bugs and various security vulnerabilities. Among the systems receiving these updates was Windows Server 2022. However, the...
According to the latest updates from Wccftech, Samsung’s “dream chip,” the Exynos 2500, has had some of its specifications unveiled. This SoC is expected to retain the deca-core CPU architecture of its predecessors while...
Kansas State University, a prominent public research institution offering 65 master’s and 45 doctoral programs, has encountered a significant cyber incident. The university, home to approximately 20,000 students and 1,400 academic staff, reported disruptions...
In a recent announcement on their official blog, Google stated that they will be adjusting their web search results in compliance with the European Union’s demands. This change is in anticipation of Google being...
According to a report by Windows Central, Microsoft is preparing for a significant update to Windows 11, codenamed “Hudson Valley,” anticipated for release later this year as either the Windows 11 24H2 or the...
Introduction Data stands as a paramount asset for companies worldwide across industries. However, amid the surge in data volume, pace, and diversity facilitated by cloud storage, ensuring data security and privacy has grown more...
A new campaign targeting vulnerable Docker services is deploying the XMRig miner and the 9hits application, enabling a dual monetization strategy on compromised hosts. This marks the first documented instance of the 9Hits application...
This week, Swiss websites encountered a series of Distributed Denial of Service (DDoS) attacks. According to the Swiss National Cybersecurity Centre (NCSC), these assaults temporarily disrupted access to several websites managed by the Federal...